Programs

Sovereign Hill
Our Conference Program

An environment where participants and experts can exchange ideas and experiences

08:00
Registration open
45 minutes
08:50

Conference start and introduction of guest speaker

MC
10 minutes
09:00

Welcome and Opening remarks

City of Ballarat
5-10 minutes
09:10

Keynote

Federation University
20 minutes
09:30

Keynote 1

eManaged Speaker
30 minutes
10:00
AM Tea
20 minutes
Session Chair: Omaru Maruatona
10:20

Special Announcement

30 minutes
10:50

How To Build Your Own Tech Startup

David Mulraney, The Repair Group
30 minutes
11:20

Fraud Investigation

Erica Muir, IBM
30 minutes
11:50

Personal Cyber Defence in the Age of Oversharing

Gyle dela Cruz
30 minutes
12:30
Lunch
1 hour
Session Chair: Cameron Foale
13:30

Automating CTI Extraction

Martin van Praag, Microsoft/ICSL
30 minutes
14:00

‘Hacking’ into your Cyber career: from Start to Specialist

Rue Marahaj, Melbourne Water
30 minutes
14:30

An Introduction to Critical Infrastructure Attacks

Sanam Makadia, Datacom
30 minutes
15:00
PM Tea
20 minutes
Session Chair: Scott Mellis
15:20

Building a High-Performing Cybersecurity Team

Prof. Paul Watters, Cyberstronomy
30 minutes
15:50

How To Land Your Dream Cyber Job

Tim Haintz, Microsoft/ICSL
30 minutes
16:20

Closing Remarks

Robert Layton
30 minutes
Master of Ceremony: Scott Mellis, David Mulraney
Session Chair: David Mulraney
09:25
Day 2 Opening
5 minutes
09:30

Topic TBA

Daniel Rodriguez, AFP
30 minutes
10:00
AM Tea
20 minutes
Session Chair: Suryani Lim
10:20

Running K7 Cyberdetective Game

Simon Lavigne, Microsoft
30 minutes
10:50

Understanding the Cyber World of Attackers and Defenders

Anurag Khanna, Crowdstrike
30 minutes
11:20

IoT Cybersecurity Rules, Regulations, Code, Guidelines & Standards

Matt Tett, Enex Testlab
30 minutes
11:50

Cyber Supply Chain Risk

Narain Singh, Telstra
30 minutes
12:30
Lunch
1 hour
Session Chair: Robert Layton
13:30

Detecting Scattered Spider: Mitre Attack perspective

Aditya Patil, Telstra
30 minutes
14:00

Case Study: How we Hacked and Translated The Great Ace Attorney

Adib Surani, Scarlet Study
30 minutes
14:30

Behind the Breach: Exploring Digital Forensics and Incident Response

Richard Grainger, Triskele Labs
30 minutes
15:00
PM Tea
20 minutes
Session Chair: Pooja Mishra
15:20

Your Identity is Under Attack: How to Fight Back and Win

Kanik Sachdeva, Medibank
30 minutes
15:50

Web Hacking for Beginners

Chuanshu Jiang, Shea Security
30 minutes
16:20

Closing Remarks

Paul Black
10 minutes
Shadow Image
Shape
Ballarat Tech School

Frequently asked questions, about the conference

Explore common questions about the BSides Ballarat Conference Program. Find details on session formats, keynote speakers, workshop schedules, and how to plan your experience. Have more questions? Reach out to us anytime!

Absolutely! BSides Ballarat is designed for everyone, whether you're a seasoned cybersecurity professional, a student just starting out, or simply curious about the field. With a wide range of talks, workshops, and networking opportunities, there’s something for all skill levels and interests. If you’re passionate about learning, connecting, and growing in cybersecurity, this conference is for you!

Are you a developer interested in building web applications and at the same time thinking about multiple parts of the stack needed to build them? Then this conference is for you. Many of the sessions either touch a specific concept or go about multiple parts of the stack.

Are you a developer interested in building web applications and at the same time thinking about multiple parts of the stack needed to build them? Then this conference is for you. Many of the sessions either touch a specific concept or go about multiple parts of the stack.

Get in Touch with BSides Ballarat

Have questions or want to get involved?

We're here to help you connect with the heart of regional cybersecurity innovation.

Contact Us
Shadow Image Shadow Image
Shape